IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets

Leona McNulty, V. Vassilakis
{"title":"IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets","authors":"Leona McNulty, V. Vassilakis","doi":"10.1109/CSNDSP54353.2022.9908039","DOIUrl":null,"url":null,"abstract":"In recent years, the world has witnessed a significant increase in the number of IoT devices, with a global and continuous rise in the demand for their multi-purpose applications. However, malicious use of IoT devices began to emerge among cybercriminals. IoT-enabled cyberattacks and botnets, such as the Mirai botnet and its variants and imitators, demonstrate that the industry needs to better secure IoT devices and networks; otherwise, there will be higher risks of exposing the Internet’s infrastructure and services to increasingly disruptive DDoS attacks. This paper presents the results of a study of IoT botnets. We focus on their distinctive characteristics, exploits used, and cyberattack capabilities. In total, we have reviewed and compared 46 recent IoT botnets. We also present details of the main CPU architectures targeted by these IoT botnets. We illustrate that IoT botnets pose a significant threat to private individuals and enterprises by employing effective evasion mechanisms, encrypted communication, and targeting a wide range of systems and networks.","PeriodicalId":288069,"journal":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNDSP54353.2022.9908039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In recent years, the world has witnessed a significant increase in the number of IoT devices, with a global and continuous rise in the demand for their multi-purpose applications. However, malicious use of IoT devices began to emerge among cybercriminals. IoT-enabled cyberattacks and botnets, such as the Mirai botnet and its variants and imitators, demonstrate that the industry needs to better secure IoT devices and networks; otherwise, there will be higher risks of exposing the Internet’s infrastructure and services to increasingly disruptive DDoS attacks. This paper presents the results of a study of IoT botnets. We focus on their distinctive characteristics, exploits used, and cyberattack capabilities. In total, we have reviewed and compared 46 recent IoT botnets. We also present details of the main CPU architectures targeted by these IoT botnets. We illustrate that IoT botnets pose a significant threat to private individuals and enterprises by employing effective evasion mechanisms, encrypted communication, and targeting a wide range of systems and networks.
物联网僵尸网络:特征、漏洞、攻击能力和目标
近年来,全球物联网设备数量显著增加,对其多用途应用的需求全球持续增长。然而,恶意使用物联网设备开始在网络犯罪分子中出现。支持物联网的网络攻击和僵尸网络,如Mirai僵尸网络及其变体和模仿者,表明行业需要更好地保护物联网设备和网络;否则,互联网的基础设施和服务将面临越来越具有破坏性的DDoS攻击的更高风险。本文介绍了物联网僵尸网络研究的结果。我们专注于它们的独特特征、利用和网络攻击能力。我们总共审查并比较了46个最近的物联网僵尸网络。我们还详细介绍了这些物联网僵尸网络针对的主要CPU架构。我们说明了物联网僵尸网络通过采用有效的规避机制,加密通信以及针对广泛的系统和网络对个人和企业构成重大威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信